1] Tyagi, A.K., G. Rekha, and N. Sreenath. Beyond the hype: Internet of things concepts, security and privacy concerns. in Advances in Decision Sciences, Image Processing, Security and Computer Vision: International Conference on Emerging Trends in Engineering (ICETE), Vol. 1. 2020. Springer.
[2] Kalra, S. and S.K. Sood, Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 2015. 24: p. 210-223.
[3] Zhang, E., et al., Fair hierarchical secret sharing scheme based on smart contract. Information Sciences, 2021. 546: p. 166-176.
[4] Taha, M.S., et al. Combination of steganography and cryptography: A short survey. in IOP conference series: materials science and engineering. 2019. IOP Publishing.
[5] Panda, S., S. Mondal, and N. Kumar, SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0. Computers & Electrical Engineering, 2022. 98: p. 107669.
[6] Sagheer, A.M. and L.H. Abed, Visual secret sharing without pixel expansion. International Journal of Digital Crime and Forensics (IJDCF), 2015. 7(2): p. 20-30.
[7] AlKhodaidi, T. and A. Gutub, Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications, 2021. 80: p. 1143-1173.
[8] Weir, J.P., Visual cryptography and its applications2011: Bookboon.
[9] Shamir, A., How to share a secret. Communications of the ACM, 1979. 22(11): p. 612-613.
[10] Chitra, M.K. and V.P. Venkatesan, An antiquity to the contemporary of secret sharing scheme. Journal of Innovative Image Processing (JIIP), 2020. 2(01): p. 1-13.
[11] Chanu, O.B. and A. Neelima, A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval, 2019. 8(4): p. 195-215.
[12] Gutub, A. and M. Al-Ghamdi, Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 2020. 79(11-12): p. 7951-7985.
[13] Al-Shaarani, F. and A. Gutub, Securing matrix counting-based secret-sharing involving crypto steganography. Journal of King Saud University-Computer and Information Sciences, 2022. 34(9): p. 6909-6924.
[14] Luo, S., et al., Secret Image Sharing Scheme with Lossless Recovery and High Efficiency. Signal Processing, 2023: p. 108931.
[15] Maharjana, S., et al., SCITECH NEPAL.
[16] Ibrahim, D.R., J.S. Teh, and R. Abdullah, An overview of visual cryptography techniques. Multimedia Tools and Applications, 2021. 80: p. 31927-31952.
[17] Bisht, K. and M. Deshmukh, A novel approach for multilevel multi-secret image sharing scheme. The Journal of Supercomputing, 2021. 77(10): p. 12157-12191.
[18] Patil, S.M. and B. Purushothama, Pixel co-ordinate-based secret image sharing scheme with constant size shadow images. Computers & Electrical Engineering, 2021. 89: p. 106937.
[19] Sarosh, P., S.A. Parah, and G.M. Bhat, Utilization of secret sharing technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications, 2021. 80: p. 517-541.
[20] Prasetyo, H. and D. Rosiyadi. Converting (n, n)-multiple secret sharing into more friendly appearance using chinese remainder theorem and boolean operations. in 2021 International Symposium on Electronics and Smart Devices (ISESD). 2021. IEEE.
[21] Naor, M. and A. Shamir. Visual cryptography. in Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9–12, 1994 Proceedings 13. 1995. Springer.
[22] Karolin, M. and D.T. Meyyapan, RGB based secret sharing scheme in color visual cryptography. International Journal of Advanced Research in Computer and Communication Engineering, 2015. 4(7).
[23] Dahat, A.V. and P.V. Chavan, Secret sharing based visual cryptography scheme using CMY color space. Procedia Computer Science, 2016. 78: p. 563-570.
[24] Bharanivendhan, N. and T. Amitha, Visual cryptography schemes for secret image sharing using GAS Algorithm. International Journal of Computer Applications, 2014. 92(8).
[25] Sharma, S., An implementation of a novel secret image sharing algorithm. International Journal of Computer Science and Mobile Computing, 2013. 2(4): p. 263-268.
[26] Kandar, S., A. Maiti, and B.C. Dhara, Visual cryptography scheme for color image using random number with enveloping by digital watermarking. International Journal of Computer Science Issues (IJCSI), 2011. 8(3): p. 543.
[27] Wu, C.-C., M.-S. Hwang, and S.-J. Kao, A new approach to the secret image sharing with steganography and authentication. The Imaging Science Journal, 2009. 57(3): p. 140-151.
[28] Hu, Y.-C., High-capacity image hiding scheme based on vector quantization. Pattern Recognition, 2006. 39(9): p. 1715-1724.
[29] Eslami, Z., S. Razzaghi, and J.Z. Ahmadabadi, Secret image sharing based on cellular automata and steganography. Pattern Recognition, 2010. 43(1): p. 397-404.
[30] Kong, J., et al. A scalable secret image sharing method based on discrete wavelet transform. in Bio-Inspired Computational Intelligence and Applications: International Conference on Life System Modeling and Simulation, LSMS 2007, Shanghai, China, September 14-17, 2007. Proceedings. 2007. Springer.
[31] Rabie, T., M. Baziyad, and I. Kamel, Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 2018. 77: p. 23673-23698.
[32] Hashim, A.T. and L.E. George. Secret image sharing based on wavelet transform. in International Conference on Information Technology in Signal and Image Processing,, Mumbai, India. 2013.
[33] Tresor, L.O. and M. Sumbwanyambe, A selective image encryption scheme based on 2d DWT, Henon map and 4d Qi hyper-chaos. IEEE Access, 2019. 7: p. 103463-103472.
[34] Huang, C.-P. and C.-C. Li, A secret image sharing method using integer wavelet transform. EURASIP Journal on advances in signal processing, 2007. 2007: p. 1-13.
[35] Dharwadkar, N.V. and B. Amberker, Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. International Journal of Signal Processing, 2010. 6(2): p. 93-100.
[36] Surekha, B. and G. Swamy, Visual secret sharing based digital image watermarking. International Journal of Computer Science Issues (IJCSI), 2012. 9(3): p. 312.
[37] Rani, A., et al., A zero-watermarking scheme using discrete wavelet transform. Procedia Computer Science, 2015. 70: p. 603-609.
[38] Tompa, M. and H. Woll, How to share a secret with cheaters. journal of Cryptology, 1989. 1(3): p. 133-138.
[39] Lukac, R. and K.N. Plataniotis, Bit-level based secret sharing for image encryption. Pattern recognition, 2005. 38(5): p. 767-772.
[40] Deshmukh, M., N. Nain, and M. Ahmed, A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. Journal of Visual Communication and Image Representation, 2017. 49: p. 291-302.
[41] Chen, T.-H. and C.-S. Wu, Efficient multi-secret image sharing based on Boolean operations. Signal Processing, 2011. 91(1): p. 90-97.
[42] Rajput, M. and M. Deshmukh, Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Computer Science, 2016. 89: p. 677-683.
[43] Ghodosi, H., J. Pieprzyk, and R. Safavi-Naini. Secret sharing in multilevel and compartmented groups. in Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings 3. 1998. Springer.
[44] Kumar, P.S., et al., Multi-level secret sharing scheme for mobile ad-hoc networks. International Journal of Advanced Networking and Applications, 2014. 6(2): p. 2253.
[45] Harn, L. and M. Fuyou, Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information processing letters, 2014. 114(9): p. 504-509.
[46] Ersoy, O., K. Kamer, and K. Kaskaloglu, Multilevel threshold secret sharing based on the Chinese remainder theorem. International Journal of Information Security Science, 2019. 8(2): p. 17-29.
[47] Basit, A., et al. Multi-stage multi-secret sharing scheme for hierarchical access structure. in 2017 International Conference on Computing, Communication and Automation (ICCCA). 2017. IEEE.
[48] Chen, D., et al., An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access, 2019. 7: p. 107104-107110.
[49] Hu, F., et al., Threshold Meaningful Secret Image Sharing Scheme Based on QR Code. Security and Communication Networks, 2022. 2022.
[50] Zhang, D. and Z. Gu, A high-quality authenticatable visual secret sharing scheme using SGX. Wireless Communications and Mobile Computing, 2021. 2021: p. 1-12.
[51] Chattopadhyay, A.K., et al., A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools and Applications, 2021. 80: p. 35051-35080.
[52] Kang, Y., et al., Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Communications, 2023. 526: p. 128896.
[53] Lin, C.-C. and W.-H. Tsai, Secret image sharing with steganography and authentication. Journal of Systems and software, 2004. 73(3): p. 405-414.
[54] Aarabi, G., G. Heydecke, and U. Seedorf, Roles of oral infections in the pathomechanism of atherosclerosis. International Journal of Molecular Sciences, 2018. 19(7): p. 1978.
[55] Chang, C.-C., J.-C. Chuang, and P.-Y. Lin. Sharing a secret two-tone image in two gray-level images. in 11th International Conference on Parallel and Distributed Systems (ICPADS'05). 2005. IEEE.